Easy To Use Patents Search & Patent Lawyer Directory

At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.

Searching:





Search by keyword, patent number, inventor, assignee, city or state:




Patent # Description
2018/0137298 REMOTE DATA ACCESS TECHNIQUES FOR PORTABLE DEVICES
A wide-area network ("WAN")-based service enables remote data access transactions between participating endpoints within a group of participating endpoints...
2018/0137297 SECURITY SYSTEM FOR INDUSTRIAL CONTROL SYSTEM
A security system for an industrial control system that includes one or more hardware entities and/or one or more software entities accessible by at least one...
2018/0137296 PROVIDING CONTAINERS ACCESS TO CONTAINER DAEMON IN MULTI-TENANT ENVIRONMENT
An example system includes a plurality of containers associated with a plurality of tenants. The plurality of containers are to execute code in isolation for...
2018/0137295 METHOD AND APPARATUS FOR MULTI-CHANNEL SECURE COMMUNICATION AND DATA TRANSFER
A method, apparatus and computer program product are disclosed to provide for the selective establishment and use of secure communication channels to...
2018/0137294 ENCRYPTION FOR XIP AND MMIO EXTERNAL MEMORIES
Techniques for multiplexing between an execute-in-place (XIP) mode and a memory-mapped input/output (MMIO) mode for access to external memory devices are...
2018/0137293 SYSTEM AND METHOD FOR IMPLEMENTING CRYPTOGRAPHY IN A STORAGE SYSTEM
A method for performing cryptography operations on data blocks within a volume of data is disclosed. The method involves generating a volume master key,...
2018/0137292 CONTROLLED PUBLICATION OF SENSITIVE CONTENT
Systems and methods are disclosed herein for publishing sensitive content at a future time, where prior to the future time, receiving an encrypted version of...
2018/0137291 SECURING FILES AT REST IN REMOTE STORAGE SYSTEMS
The disclosed embodiments provide a system for managing access to a remote storage system. During operation, the system receives a first request from a user to...
2018/0137290 APPARATUS, METHOD AND ARTICLE OF MANUFACTURE FOR PARTIALLY RESISTING HARDWARE TROJAN INDUCED DATA LEAKAGE IN...
Apparatus, method and article of manufacture providing a randomized encoding scheme for sequential logics, for resistance to data leakage. Invention employs...
2018/0137289 SYSTEM AND METHOD FOR PROTECTING SYSTEMS FROM ACTIVE CONTENT
The disclosed embodiments include a method of disarming active content in a received input file in a computer system having a processor. The method includes...
2018/0137288 SYSTEM AND METHOD FOR MODELING SECURITY THREATS TO PRIORITIZE THREAT REMEDIATION SCHEDULING
A system and method is disclosed for modeling electronic security threats of an enterprise architecture to determine optimal remediation actions to maximize...
2018/0137287 INFRASTRUCTURE DIAGNOSTIC SYSTEM AND METHOD
A system for diagnosing and analyzing infrastructure, comprising: a storage unit storing a diagnostic script, which is for collecting system information from a...
2018/0137286 METHOD AND APPARATUS FOR SECURITY TESTING OF APPLICATION FLOWS THAT CANNOT BE AUTOMATED THROUGH HTTP REPLAY
Technical solutions are described for testing a computer program product. An example method includes intercepting an instance of a request sent for execution...
2018/0137285 INFORMATION PROCESSING APPARATUS AND COMPUTER PROGRAM PRODUCT
According to one embodiment, an information processing apparatus includes a first memory, a signal generation unit, an integrity check unit, and an ...
2018/0137284 COMPUTING SYSTEM FOR MANAGING FIRMWARE AND FIRMWARE MANAGING METHOD THEREOF
A firmware managing method of a computing system includes receiving a first firmware image, a second firmware image, first model information of a first...
2018/0137283 METHOD AND DETECTION CIRCUIT FOR DETECTING SECURITY CHIP OPERATING STATE
The present invention provide a method and a detection circuit for detecting a security chip operating slate. The detection circuit includes: a first register...
2018/0137282 Remote Malware Scanning Capable of Static and Dynamic File Analysis
Measures for enabling resource-efficient remote malware scanning capable of static and dynamic file analysis. including, at a remote entity, obtaining metadata...
2018/0137281 SOFTWARE ANALYSIS SYSTEM, SOFTWARE ANALYSIS METHOD, AND SOFTWARE ANALYSIS PROGRAM
In accordance with codes of applications, it is determined whether the applications access predetermined privacy information due to permission, a first label...
2018/0137280 METHOD AND SYSTEM FOR PROTECTING COMPUTERIZED SYSTEMS FROM MALICIOUS CODE BY MEANS OF MUTABLE INSTRUCTIONS
The invention relates to a method for providing a computerized system which is protected from unauthorized programs coming from an external source, the method...
2018/0137279 SCAN TIME REDUCTION IN APPLICATION CODE SECURITY SCANNING
A computer-implemented method for security scanning application code includes executing, via a processor, a full scan of the application code and generating a...
2018/0137278 Apparatus and Method for Enhancing Security of Data on a Host Computing Device and a Peripheral Device
A method of enhancing security of at least one of a host computing device and a peripheral device coupled to the host computing device through a communication...
2018/0137277 DYNAMIC NORMALIZATION OF MONITORING NODE DATA FOR THREAT DETECTION IN INDUSTRIAL ASSET CONTROL SYSTEM
Operation of an industrial asset control system may be simulated or monitored under various operating conditions to generate a set of operating results....
2018/0137276 CLOCK FREQUENCY DETECTION METHOD AND APPARATUS
Embodiments of the present disclosure disclose a clock frequency detection method and apparatus. The method includes: dividing a known internal clock frequency...
2018/0137275 MALWARE COLLUSION DETECTION
Embodiments of the invention provide for malware collusion detection in a mobile computing device. In one embodiment, a method for malicious inter-application...
2018/0137274 MALWARE ANALYSIS METHOD AND STORAGE MEDIUM
A malware analysis method for analyzing malware using a virtual computer includes acquiring a request from the malware to the guest OS. If the request from the...
2018/0137273 SECURE DEBUGGING IN A TRUSTABLE COMPUTING ENVIRONMENT
A trusted component commences a debugging session, based on determining that debugging of a virtual machine is to be initiated. The commencing of the debugging...
2018/0137272 METHODS FOR SECURELY STORING SENSITIVE DATA ON MOBILE DEVICE
Methods and systems for protecting sensitive data on a mobile device. In an embodiment, a mobile device processor of a mobile device downloads, from a provider...
2018/0137271 Method, Server, Firewall, Control Device, and System for Programming a Control Device of a Vehicle
The invention relates to a method for programming a control device of the vehicle, the method comprising: writing a first software module into the control...
2018/0137270 METHOD AND APPARATUS FOR NON-INTRUSIVE PROGRAM TRACING FOR EMBEDDED COMPUTING SYSTEMS
Systems and methods for non-intrusive program tracing of a device are disclosed. The method includes providing a database storing a plurality of candidate...
2018/0137269 NETWORK MONITORING DEVICE AND METHOD, APPARATUS AND SYSTEM FOR RESETTING PASSWORD THEREOF, AND SERVER
Disclosed are a network monitoring device, a method, apparatus and system for resetting a password of the network monitoring device, and a server. The method...
2018/0137268 AUTHENTICATION SCREEN
Techniques are disclosed relating to authenticating a user via a lock screen. In one embodiment, a computer device presents a two-dimensional matrix of...
2018/0137267 AUTHENTICATION OF AUDIO-BASED INPUT SIGNALS
The present disclosure is generally directed a data processing system for authenticating packetized audio signals in a voice activated computer network...
2018/0137266 MOBILE TERMINAL AND METHOD FOR CONTROLLING SAME
The present invention relates to a mobile terminal formed to cover a wrist. A mobile terminal according to one embodiment of the present invention comprises: a...
2018/0137265 TERMINAL DEVICE AND COMPUTER PROGRAM
A terminal device (10) comprises a group of sensors (11, 14 to 17) acquiring multiple different pieces of authentication information such as a password,...
2018/0137264 GENERATING ALERTS BASED ON VEHICLE SYSTEM PRIVACY MODE
A vehicle computing platform may receive driver sensor data indicating whether a driver seat in a vehicle is occupied. The vehicle computing platform may...
2018/0137263 PREVENTING UNAUTHORIZED ACCESS TO SECURED INFORMATION USING IDENTIFICATION TECHNIQUES
A vehicle computing platform may receive driver sensor data indicating whether a driver seat in a vehicle is occupied. The vehicle computing platform may...
2018/0137262 SOFTWARE DUPLICATION PREVENTION SYSTEM
A software duplication prevention system includes: a terminal having a receiver and basic software; and a post having a transmitter transmitting data. The data...
2018/0137261 SECURE PROVISIONING AND MANAGEMENT OF DEVICES
Systems for secure provisioning and management of computerized devices. The system may include a distributor appliance that is communicatively connected to the...
2018/0137260 DISTRIBUTOR PRODUCT PROGRAMMING SYSTEM
A product programming system includes a product subject to maintenance, part refurbishment and/or part replacement that has a security device communicatively...
2018/0137259 DEVICE AND METHOD FOR ADAPTING THE USE OF AN APPARATUS
A device for adapting the use of an apparatus is provided. The device has a processing unit for checking if a license for the apparatus exists and for...
2018/0137258 SYSTEM AND METHOD FOR ANALYZING A DEVICE
A system and method for analyzing a device are disclosed. In an aspect, a method can comprise determining a parameter of a device at a kernel level of a...
2018/0137257 SENSING DEVICE, SENSING METHOD, AND SENSING PROGRAM
In order to provide a sensing device and the like capable of using the behavior of a plurality of microorganisms changing over time as a sensor for estimating...
2018/0137256 SYSTEM AND METHOD OF CALCULATING THE STRUCTURE AND PROPERTIES OF CHEMICALS
The system and method accurately models the stability and structure, and other properties, of chemical compounds. The method is general and requires less...
2018/0137255 SYSTEM AND METHOD FOR CHARACTERIZING DATA THROUGH A PROBABILISTIC DATA STRUCTURE
A system and method for resolving data through a probabilistic data structure can include initializing a B-field data structure, inserting a key-value element...
2018/0137254 MINIMIZING ERRORS IN PRESCRIPTION MEDICATION DISPENSING
Embodiments include method, systems and computer program products for minimizing errors in prescription medication dispensing. Aspects include obtaining, by a...
2018/0137253 METHOD AND APPARATUS FOR DETERMINING EVALUATION FACTOR FOR PHYSIOLOGICAL CONDITION
The present discloses provides a method and apparatus for determining an evaluation factor for a physiological condition. The method includes steps of:...
2018/0137252 PATIENT MONITORING SYSTEMS AND METHODS WITH EVENT LOG INTEGRATION
Systems, devices and methods are provided for monitoring a physiological condition of a patient. An exemplary method involves a client computing device...
2018/0137251 BASAL INSULIN MANAGEMENT
An improved basal insulin management system and an improved user interface for use therewith are provided. User interfaces are provided that dynamically...
2018/0137250 MOBILE HEALTH INTELLIGENT MEDICAL GUIDE SYSTEM AND METHOD THEREOF
The present invention discloses a mobile health intelligent medical guide system and method thereof. The method comprises steps: collecting patient chief...
2018/0137249 Extending Medical Condition Base Cartridges Based on SME Knowledge Extensions
Mechanisms are provided for extending a medical condition base cartridge (MCBC) based on user modifications of the MCBC. The mechanisms generate a MCBC for a...
← Previous | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 | Next →

File A Patent Application

  • Protect your idea -- Don't let someone else file first. Learn more.

  • 3 Easy Steps -- Complete Form, application Review, and File. See our process.

  • Attorney Review -- Have your application reviewed by a Patent Attorney. See what's included.